2021
DOI: 10.11591/ijaas.v10.i2.pp178-187
|View full text |Cite
|
Sign up to set email alerts
|

A systematic overview of secure image steganography

Abstract: <p>Information is a vitalthing that needs to be secured and well protected during transmission between two or more parties over the internet. This can be achieved by steganography technology. Steganography is the concealing science in which the information is concealed inside other information in a way that the concealed information cannot be detectable by the human eye. Many ways are available to hide data inside a cover media for example text, image, and audio steganography, but image steganography is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…In the begging, the inputting color image is divided into two equal parts (upper UP and lower LW) with size Sk. Second, using LFSRs that comprise three registers with different lengths (29,31,33) and different taps (2,7,13), (1,2,3), (11,13,22), respectively, key K is generated that contains non-repetitive random numbers with size Sk. The same key is used to redistribute the locations of the pixels in each part.…”
Section: Changing the Pixel's Position (Confusion)mentioning
confidence: 99%
See 1 more Smart Citation
“…In the begging, the inputting color image is divided into two equal parts (upper UP and lower LW) with size Sk. Second, using LFSRs that comprise three registers with different lengths (29,31,33) and different taps (2,7,13), (1,2,3), (11,13,22), respectively, key K is generated that contains non-repetitive random numbers with size Sk. The same key is used to redistribute the locations of the pixels in each part.…”
Section: Changing the Pixel's Position (Confusion)mentioning
confidence: 99%
“…With the great and rapid technological development in various fields, including computers and data transfer, images are exposed to many risks and security threats, especially when transmitted through unsecured channels over the internet [1], [2]. Particularly in times of war, the confidentiality and security of transmitted information play an essential role in success [3].…”
Section: Introductionmentioning
confidence: 99%